Project

General

Profile

Actions

Feature #6839

closed

Mechanism to prevent flooding log with entries from blocked packets

Added by Daryl Morse over 7 years ago. Updated over 4 years ago.

Status:
Closed
Priority:
Normal
Assignee:
-
Category:
-
Target version:
-
Start date:
10/05/2016
Due date:
% Done:

0%

Estimated time:
Plus Target Version:
Release Notes:

Description

The firewall log is being filled with thousands entries from blocked packets: WAN / 10.197.248.27 / 224.0.0.1 / IGMP.

In this specific case, the packets being blocked are IGMP packets being sent to the broadcast address from a private address by the ISP. They are being blocked by one of the rules to block packets from private networks. I would prefer to only prevent logging these specific entries, but not entries from other packets from private networks.

There is no simple way to do this. It's not possible to create a rule to block the specific packets, but not log them, because the built-in rule is processed first.

Ideally, a feature that allows a user to select an entry in the log and create a rule that prevents it from being logged, without disabling the rule that caused it. There are other ways this could be done, such as providing a setting in the rule that causes it to be processed ahead of built-in rules.

Actions

Also available in: Atom PDF